Cybersecurity

Microsoft and Law Enforcement Collaborate to Dismantle RedVDS
Cybersecurity
Microsoft and Law Enforcement Collaborate to Dismantle RedVDS
Microsoft and law enforcement have disrupted the RedVDS cybercrime operation, which facilitated phishing and other malicious activities. This operation involves seizing digital infrastructure and pursuing ...
Critical Remote Code Execution Threat in Fortinet's SIEM Solution Exposed
Cybersecurity
Critical Remote Code Execution Threat in Fortinet’s SIEM Solution Exposed
A significant vulnerability has been identified in Fortinet's Security Information and Event Management (SIEM) product. This flaw could let a remote attacker execute commands or ...
New Linux Malware, VoidLink, Exploits Cloud Infrastructures with Over 30 Plugins
Cybersecurity
New Linux Malware, VoidLink, Exploits Cloud Infrastructures with Over 30 Plugins
VoidLink, a sophisticated Linux malware, exploits cloud environments with 37 plugins enabling activities from reconnaissance to lateral movement, posing serious risks.
Malware Campaign Exploits DLL Side-Loading in c-ares Library
Application Security
Malware Campaign Exploits DLL Side-Loading in c-ares Library
Security experts uncovered a malware scheme bypassing security via DLL side-loading in c-ares library. Attackers leverage a malicious libcares-2.dll to deploy trojans.
Fortinet's Latest Patches Target Critical Vulnerabilities in FortiFone and FortiSIEM
Application Security
Fortinet’s Latest Patches Target Critical Vulnerabilities in FortiFone and FortiSIEM
Fortinet's recent patch release addresses six security vulnerabilities, with two significant vulnerabilities found in FortiFone and FortiSIEM. These critical issues could be exploited without authentication, ...
Court Dismisses Investor Dispute Against CrowdStrike Due to Insufficient Evidence
Cybersecurity
Court Dismisses Investor Dispute Against CrowdStrike Due to Insufficient Evidence
A judicial decision marked a win for CrowdStrike as an investor lawsuit was dismissed due to inadequate evidence of intent to defraud investors following a ...
Lumen Technologies Disrupts AISURU and Kimwolf Botnet Networks
Cybersecurity
Lumen Technologies Disrupts AISURU and Kimwolf Botnet Networks
Lumen Technologies’ Black Lotus Labs null-routed traffic to more than 550 command-and-control nodes since October 2025, targeting AISURU and Kimwolf botnets. These networks exploit devices ...
Telecom Giants Face Significant GDPR Fines Due to Data Breaches
Data Security
Telecom Giants Face Significant GDPR Fines Due to Data Breaches
Two French telecom companies were fined €42 million by CNIL for GDPR violations. The breaches revealed significant lapses in security protocols.
Aikido Security Secures $60 Million Investment at $1 Billion Valuation
Cybersecurity
Aikido Security Secures $60 Million Investment at $1 Billion Valuation
Aikido Security, a firm dedicated to developer security, recently raised $60 million, elevating its valuation to $1 billion. This milestone is part of their broader ...
PLUGGYAPE Malware Targets Ukraine's Defense Amid Rising Cyber Threats
Cybersecurity
PLUGGYAPE Malware Targets Ukraine’s Defense Amid Rising Cyber Threats
CERT-UA reported recent cyberattacks targeting Ukraine's defense using PLUGGYAPE malware. Security experts associate these assaults with medium confidence to the Russian-affiliated Void Blizzard group.